ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "CW Special Reportstart%3D20start=20start=10start=30start=30"

  • Jargon Buster Guide to Container Security

    Sponsored by: TechTarget ComputerWeekly.com

    The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.

  • How manufacturing organisations can build agile and cyber resilient supply chains

    Sponsored by: Vodafone

    In this eBook, you’ll learn about what issues manufacturing organizations are facing, key trends that are impacting them and how technology can help these firms build resilient supply chains against operational risks. Read the eBook.

  • CW APAC, April 2022: Trend Watch: Cyber security

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

  • Computer Weekly – 31 January 2017: Visionary technology transforming healthcare

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, find out how a visionary approach to technology is transforming healthcare at London's world-leading Moorfields Eye Hospital. The UK tech sector has set out its priorities for the forthcoming Brexit negotiations – we take a look. And our new buyer's guide examines trends in datacentre management. Read the issue now.

  • Making the Move to Modern IGA Expert Insights To Transition Your Legacy Identity Platform

    Sponsored by: Saviynt

    This guide shares expert advice on preparing for, executing, and measuring a modernization campaign’s success. Insights surround building consensus, evaluating platforms, managing migration, and measuring success. Importantly, it also features real-world examples from practitioners on the other side of successful transitions. Read the guide today!

  • Step-by-step disaster recovery planning guide

    Sponsored by: TechTarget ComputerWeekly.com

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

  • Software-Defined Storage: A Guide to Successful Implementation

    Sponsored by: IBM

    In this expert e-guide, explore today's SDS implementation options and help you decide which one fits your needs best: commodity or custom hardware. Additionally, uncover the important considerations – like the specific needs of virtual environments, access points, and APIs – that you'll need to address when formulating your storage strategy.

  • Navigate the era of new customer expectations

    Sponsored by: ServiceNow

    For companies to be successful, they must achieve the delicate balance of finding ways to reduce costs while still delivering seamless customer experiences that stand out versus the competition. Today, focusing solely on customer engagement is not enough. Customers also want easy problem-solving with minimal effort. Read on to see how to offer it.

  • Unlocking AI’s Potential: Accelerating the AI Adoption Journey

    Sponsored by: Oracle

    As companies continue to implement AI, some have been experiencing a lack of quality data and skills as well as cost, security, and privacy concerns due to the AI they’ve implemented. So, what steps can you take to ensure that you can combat these challenges and accelerate your adoption? Dig into this guide to learn more.

  • The Managed Detection And Response Landscape, Q1 2023

    Sponsored by: Bitdefender

    Organizations of all sizes are turning to managed detection and response (MDR) solutions to quickly handle suspicious activity and contain threats. However, while MDR solutions have been proven, there are a lot of options in the market to choose from which makes picking the right solution for you a challenge. Read on to learn how to choose wisely.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.